AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history and may try and assassinate me Switzerland, especially since I have decifered the code (i.e., the Davinci Code) which is used by Greenland to plot terror attacks in the underworld via the CIA, hence the long list of foiled terror attacks and timely Truther.org terror alerts.

SWITZERLAND, Zurich —Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is plotting a wave of ISIS-inspired attacks in Mexico and/or the full-scale ISIS invasion of Mexico, most likely in Tijuana.

Although the impeding ISIS attack and/or invasion of Mexico could theoretically tranpsire anywhere withing the country of Mexico, it will most likely occure across the border from San Diego, California at the Tijuana International Airport in Mexico.

Although only conjecture, it appears that the first-ever American airport bridge straddling two countries was specifically built at behest of the CIA on December 9, 2015, in order to facilitate the ISIS-insprired invasion of the United States via Tijuana, Mexico.

The disappearance of Malaysian Airlines Flight MH370 is unprecedented and therefore highly suspicious, namely because it was previously outfitted with GPS navigational equipment which has never been used to locate the plane. Consequently, it can be deduced that the plane was specifically disappeared so that it can be used in an upcoming terror attack.

The invasion will likley be executed in-part by 2 Afghani men who went missing on December 11, 2015, while reportedly training at Georgia Air Force Base. Aside from being pilots, the 2 missing Afghani airmen will predictably have military clearence, allowing them to circumvent the Mexican Air Force and/or the U.S. Air Force.

Islamic Invasion of Americas Trending
Prior to a high-profile Islamic invasion of the United States via Mexico, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced, Islamic person traveling to the Americas is now at an all-time high which suggests that a state-sponsored Islamic invasion of the United States is imminent.Islamic Invasion Timeline:

Predator Drone Strikes
In the aftermath of an ISIS invasion of Florida Predator drones will be released in mass in order to hunt and kill the Islamic terrorists. In time, said terrorists will be linked to white domestic terrorists, resulting in drone strikes on both parties. After all, the goal of the Obama administration is to somehow merge bearded Islamic terrorists with those who fly the Confederate Rebel Flag and root for the Ole Miss Rebels in the American South. These so-called domestic/jihadist terrorists will likely be dubbed “White Al Qaeda”, looking similar to the actors depicted on the hit television show Duck Dynasty. This marriage will give the U.S. government the plausible deniability it needs so that it the wake of domestic drone strikes, it cannot be held responsible for not being able to discern between Islamic terrorists and so-called domestic terrorists. This will ultimately allow the Obama administration to eradicate all of its political opposition with autonomous Predator drones, a preview of which was witnessed back on November 30, 2013, when Paul Walker was assassinated via drone strike in Los Angeles. The notion that Predator drones are the endgame of JADE HELM 15 was ominously foreshadowed by Daily Show host John Stewart on May 4, 2015, when he made a reference to the Predator (and thereby Predator drones) in relation to JADE HELM 15. Stewart stated, “I find it adorable that your governor [of Texas] thinks your state guard can take on the U.S. military; it’s like a little dog growling at a big dog, or an 8-year old dog picking a fight with the Predator”.

FEMA Camps
The endgame of JADE HELM 15 is the opening of Nazi-like FEMA concentration camps which have been built for the wholesale slaughter of the American public. Yes, there are concentration camps located across the United States, a notion which has been confirmed by multiple mainstream and alternative news sources. Bard-wire fences facing inward, human transport rail cars, mass coffins, and human incinerators reminiscent of Nazi Germany’s concentration camps are all present at FEMA facilities across America. In the aftermath of the ISIS invasion of Texas, FEMA camps will be opened under the guise of housing Islamic terrorists who were apprehended in Texas. In time, these Islamic terrorists will be joined by thousands of Texans who are allegedly working with ISIS. The notion that the war game is cover for the opening of FEMA camps was first identified back on March 23, 2015 in an Army Times report which stated that JADE HELM 15 would prepare troops to “throw citizens in FEMA camps,” and that there are allegations that “FEMA ‘death domes’ popping up across Texas“, purportedly to “house captured American insurgents”. Roughly 6-weeks later on May 6, 2015, the New York Times published a report which stated that “shuttered Wal-Mart stores would be used for “FEMA processing camps“. Roughly 2-weeks later on May 17, 2015, the Hartford Courant‍ published a report which stated that the U.S. military “plans to round up political dissidents” and “remove key political figures”, plans eerily reminiscent of Nazi Germany. Roughly 2-months later on July 10, 2015, the Houston Chronicle published a report which stated that JADE HELM is raising “fears [about] the imminent opening of concentration camps”. That same day, July 10, 2015, Russia Today published a report which stated that JADE HELM 15 will feature “deportations to FEMA “internment camps”. Two days later on July 12, 2015, the New York Times published a report which stated that “Political opponents of President Obama will be rounded up and herded into detention centers”. Also on July 12, 2015, Yahoo News published a report which quoted a Bastrop, Texas resident Josh Munyon who stated that “They already have FEMA trains that […] look like the trains that the Nazis used in World War II”. A day later on July 13, 2015, the Guardian published a report which stated that JADE HELM 15 is a prelude to “locking innocent Americans in internment camps”. A day later on July 14, 2015, Russia Today published a report which stated that Texans may be “bundled into concentration camps”. Needless to say, these reports, taken collectively, suggest that JADE HELM 15 is for the cover for the opening of Nazi-like FEMA concentration camps which will cull millions of Americans, namely in Texas.

Truther.org Legal DisclaimerTruther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

SWITZERLAND, Zurich — Based on breaking news and events, it appears that the Obama administration (the behest of CIA Headquarters beneath Lake Geneva) is preparing to execute “eco”, “domestic” and/or “jihad”-related terror attacks at SeaWorld in California, Florida and/or Texas.

Although SeaWorld-related terror attacks could theoretically target any one of the three SeaWorld locations within the United States, SeaWorld San Diego is the most likely to suffer an attack due to the fact that it’s the most popular of the SeaWorld locations.

Exactly what type of terror attack is planned for SeaWorld is not known, but a future terror scenario in which SeaWorld patrons are held hostage, killed in mass, and/or a number of exotic sea animals are released and/or massacred in cold blood is now an impending reality.

In order to associate SeaWorld with terrorism just prior to a state-sponsored attack, it was reported on April 17, 2015, that the TSA trained security teams at SeaWorld in “Screening of Passengers by Observation Techniques” (SPOT) program, which rates things like “exaggerated yawning” and “facial flushing” as possible marks of terrorism.

That same day, May 21, 2015, it was also reported that a 500-gallon water tanker was stolen from Oakland, California. Although only conjecture, it’s possible that the tanker will be used in a future terror attack on SeaWorld, possibly to transport bio-chemical weapons.

That same day, June 4, 2015, a publicity stunt was executed in the Pacific Ocean when a fake Killer Whale had its engine flooded. Considering that SeaWorld’s unofficial mascot is the orca (i.e., Killer whale), the publicity stunt was evidently designed to draw global attention to SeaWorld just prior to an attack.

The fact that the SeaWorld employee was: a) allowed to try and incite violence among peaceful protesters for years, and b) was not fired from his position at SeaWorld, confirms, albeit in a de facto manner, that the man is an undercover agent (most likely FBI) whose job was to set-up activists for the impending eco-terrorist attack on SeaWorld.

In what appears to be pre-San Diego SeaWorld terror attack programming, it was reported on June 22, 2015, that Speed the Galápagos tortoise died at the San Diego Zoo. The death of the sea creature has set the precedent for future sea animal deaths in San Diego, most likely at SeaWorld.

Sea Animal Terror Trending
Prior to a shocking SeaWorld-related terror attack, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced, sea animal terror is now at an all-time high which suggests that a state-sponsored terror attack on a sea animal-related entity such as SeaWorld is imminent.

Truther.org Legal DisclaimerTruther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

SWITZERLAND, Zurich — Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is preparing to execute a North Korean-based nuclear, bio-chemical or EMP-related missile strike upon the United States, most likely via submarine.

Said attack will likely feature a North Korean-based nuclear, bio-chemical or EMP-related missile strike upon the United States, most likely striking U.S. military bases in Hawaii, Japan and/or California. That being said, big cities such as Los Angeles and San Francisco, California would be targeted as well.

The notion that North Korea wants to attack the United States was once again confirmed by a CNN report from August 16, 2015, entitled “North Korea Threatens to Attack U.S.”. Said attack will most likely come from a North Korean submarine within the Pacific Ocean.

Five days later on August 21, 2015, USA Today published a report entitled “North Korea: We’re in a ‘Quasi-State of War’” which was designed to show that the country of North Korean is on war footing, making the notion of an unprovoked attack on the U.S. seem all the more plausible.

So-called “Final Attack” will likely come via a fleet of North Korean submarines. This notion was foreshadowed on August 23, 2015, when Russia Today revealed that North Korean subs are now “out for operations”. Said operations likely involve a nuclear, bio-chemical or EMP-related missile strike upon the U.S.

In order to foreshadow that a conflict between the U.S. and North Korea is imminent, CNN published a report on September 1, 2015, entitled “North Korea has No Chance of Victory Against the U.S.”. While true, an attack would be used to spark a biological pandemic, create a nuclear biohazard, or knock out America’s electrical grid.

North Korea’s Missile Activity Reaching CrescendoEscalating missile and rockets tests by North Korea are increasing in proximity and well as distance. If the reports and propaganda is to be believed, North Korea now has the capability to launch missiles into outer space as well as strike America. To date, North Korea has allegedly conducted at least 12 missile tests and 2 rocket tests that will likely culminate in an unprecedented and unprovoked biological and/or chemical attack by North Korea on South Korea or its neighbors using the agents known as anthrax or smallpox.

Kim Jong-Un Under Swiss CIA Mind Control
Shortly after the mysterious death of North Korean President Kim Jong-il on August 24, 2012, his son, Kim Jong-un was placed into power. Since then, Jong-un has been routinely portrayed in the media as being mentally unstable, highly insecure, and willing to attack anyone at a moment’s notice. Not surprisingly, Kim Jong-un exhibits all the telltale signs of being brainwashed and under state-sponsored mind-control. Jong-un was reportedly spotted with his “handler” on numerous occasions while attending a “private school” in Switzerland which is home to the CIA. According to Wikipedia, “mind control” was first developed in Korea during the Korean War and involves a process in which a group or individual “systematically uses unethically manipulative methods to persuade others to conform to the wishes of the manipulator(s), often to the detriment of the person being manipulated”. Needless to say, Un is a patsy of the CIA who holds no real power. Like his father, he will be assassinated once he fulfills his respective mission which evidently consists of an unprovoked attack on the United States while Obama is in office.I. NUCLEAR ATTACK:

1.2: Nuclear Tests by North KoreaAs evidenced, North Korea has continued their nuclear tests regardless of the sanctions imposed by the United Nations. With each passing nuclear test, the respective yield of the test jumps considerably higher. Therefore, the 4th nuclear test (or the 1st North Korean nuclear attack) should yield somewhere in the neighborhood of 25-40 kilotons of TNT, an amount on par with Pakistan’s nuclear program. According to physicists who testified before a U.S. Congress hearing back on October 7, 1999, nuclear weapons with yields of 10 kilotons or less can produce a large EMP that is capable of destroying America’s electrical grid.

2.2: North Korean’s “Active” Bio-Weapons Program
Back on September 7, 2005, a U.S. government report stated that there was an “active” biological weapons program in North Korea. The findings were outlined in the State Department’s “Adherence to and Compliance with Arms Control, Nonproliferation, and Disarmament Agreements and Commitments” report. According to the report, North Korea has a “dedicated, national-level effort to develop a Bio-Weapons capability”.

2.8: North Korea’s “1.25 Million Chemical Bombs”
Back on October 14, 2010, it was reported that Kwon Yang-Joo, an official with Korea Institute for Defense Analyses (KIDA), had stated that North Korea could easily manufacture up to 12,000 tons of chemical weapons as well as produce upwards of 1.25 million chemical bombs, all of which could be deliverable by aircraft, missiles or artillery shells. Yang-Joo went on to state that North Korea’s chemical weapons stockpile is South Korea’s number one security priority and that, “The international community must show its strong will in seeking disarmament of North Korea’s chemical weapons”.

2.12: U.N. Investigates North Korea for Exporting Chemical WeaponsBack on January 6, 2012, it was reported that the United Nations is looking into allegations that North Korea attempted to export chemical weapons to Syria in 2009. According to the report, Greek authorities allegedly seized a shipping container from a Liberia-registered freighter stuffed with approximately 14,000 anti-chemical weapons suits along with multiple types of ampules believed to be made of glass containing powdered or liquid reagents used to identify chemical substances that become airborne after a chemical weapons attack. These reagents can either be used during a chemical weapons attack or in the defense against them. The Greek government reported the seizures of the ampules and suits in September of 2011 as a violation of the U.N. Security Council’s Sanctions Committee’s resolution banning North Korea from exporting arms-related materials.

3.2: Blackout Terror Trending
Prior to a high-profile nuclear/EMP attack by North Korea, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced electricity-related terror is now at an all-time high which suggests that a state-sponsored terror EMP attack is imminent.

Truther.org Legal DisclaimerTruther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

SWITZERLAND, Zurich — Based on breaking news and events, it appears CIA Headquarters beneath Lake Geneva is preparing to stage a surprise Chinese attack and/or invasion, most likely targeting the United States or her military, most likely in San Diego, Hawaii and/or the South China Sea.

The impending Chinese attack will likely involve one or more of the following: a) a cyber-related attack on the U.S. financial system; b) a conventional nuclear attack; c) a TV-related cyber-hijack and subsequent nuclear attack; d) an EMP attack; and/or e) the full-scale Chinese invasion of Australia Hawaii, Japan, Taiwan, the Philippines and/or mainland United States.

Consequently, the most likely Chinese attack scenario is a drone-related cyber-hijack/attack and/or a Chinese-based cloaked drone attack (see below) on the West Coast of America (e.g., Los Angeles, San Diego, San Francisco, Seattle etc.) followed by a full-scale nuclear attack on Las Vegas, Los Angeles and/or San Francisco.

As previously reported, the Swiss CIA is desperately trying to trigger World War III between the United States and China. To date, at least 17 different of Chinese “surprise” attack plots have been identified and exposed by Truther.org, this being the latest.

Back on August 10, 2015, Yahoo new published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”. The timely report was evidently designed to raise the specter of a drone-related hack and attack just prior to it transpiring in reality.

In what appears to be pre-Chinese drone attack propaganda, Russia Today published a report on August 31, 2015, entitled “Toe to Toe with US: China Unveils its Heaviest Drone”, further highlighting that a future drone-related confrontation between the U.S. and China is imminent.

In what appears to be the state-sponsored war game for a Chinese attack on America, it was reported on September 2, 2015, that Russia and China are executing their largest naval exercise yet. Said war games will likely culminate an unprovoked attack/invasion of the continental United States and/or one of the aforementioned countries.

Reflecting on the civil and non-eventful meeting between Obama and Xi in Washington, CNN published a report on September 25, 2015, entitled “U.S. and China Make Progress, but Differences Lurk” which foreshadows that all is not good between the U.S. and China.

Chinese Surprise Attack Propaganda
Prior to a high-profile Asian based attack on the United States, the public must be psychologically prepared to accept that this is in fact possible. Hollywood movie propaganda is a slick way of showing that yes, it can happen. “Red Dawn” (2012) is a film (see trailer) in which the United States is the victim of a red-dawn surprise attack by military aircraft from North Korea. “Battleship” (2012) is another film (see trailer) in which the U.S. Navy and the State of Hawaii are the victims of a surprise attack, by transformer-like machines. “Olympus Has Fallen” (2013) is a film (see trailer) in which Washington D.C., is ambushed in a surprise attack by an ex-North Korean terrorists who employ military aircraft, suicide bombers and cyber-attacks in a bid to overthrow the U.S. government. “Pacific Rim” (2013) is a film (see trailer) which features a plot in which the U.S. is attacked by monster-like machines from deep under the Pacific Ocean. According to the trailer, the machines target San Francisco, California, Manila, Philippines, and Cabo San Lucas, Mexico, two of which are targets in reality. On May 16, 2014, “Godzilla” (2014) is a film (see trailer) which depicted an Asian-based monster who travels across the Pacific to attack the city of San Francisco. Interestingly, a day before the movie premiered, a San Francisco traffic sign was reportedly hacked to warn drivers of a “Godzilla Attack”. Exactly when this Asian “surprise” attack propaganda will manifest itself in reality is not known, but the masses have been conditioned for an attack on the West Coast of America, one which may transpire prior to during the 2014 RIMPAC Navel Exercise.

China’s “Invisibility Cloak”
In order for the Chinese to pull off a “stealth” drone attack on the U.S., they will have to, at least theoretically speaking, employ some sort of technology which renders America’s electronic defenses useless. Back on November 12, 2013, it was reported that the University of Toronto demonstrated an active invisibility cloak for the first time. Predictably, less than a month later on December 9, 2013, it was revealed that Chinese scientists are upbeat on development of invisibility cloak that would, in theory, allow the Chinese military to hide objects from view and make them “disappear”. In other words, if and when China attacks America, they will do so via superior technology which in will in essence make their respective military equipment invisible to American defense systems (e.g., radar, satellites, sonar, etc.). Shortly thereafter on November 19, 2013, U.S. Navy Capt. Mark Hagerott cited recent reports about sonic computer viruses as one way that hackers could “jump the air gap” and target systems that are not connected to the Internet. In other words, these so called Chinese viruses could attack U.S. military defense systems not connected to the internet, essentially rendering them useless.

I: CYBER-HIJACK DRONE ATTACK:

1.1 Chinese Cyber-Hijack Possible
Back on November 19, 2013, U.S. Navy Captain Mark Hagerott warned that sonic computer viruses launched by hackers could “jump the air gap” and target military systems that are not connected to the internet. In other words, Chinese computer viruses are able to attack U.S. military defense systems, even those not connected to the internet. The report was evidently designed to make the notion of drone hacking seem more feasible prior to its fruition in reality. After all, if viruses are able to “jump the air gap”, infecting airborne drones isn’t such an outrageous mental leap.

1.2: Drone Hijack Propaganda
In order to bring unprecedented media attention to cyber-hijacking prior to the China hijacking U.S. drones to launch attacks, it was reported on March 16, 2014, that the missing Malaysian Flight MH370 may have been the world’s first ever cyber hijack. Shortly thereafter, the television series entitled “24: Live Another Day” (2014) debuted on May 5, 2014. In short, the plot depicts Islamic terrorists who hijack U.S. military drones. Once under control of the terrorists, the drones are used to attack U.S. interests and allies. A “secret device” is used in the show to override U.S. cyber-security, suddenly turning friendly drones into enemy drones. Because the drones are built with the latest stealth technology, they are almost impossible to bring down. Consequently, the hijacked drones are used to attack football stadiums and hospitals in London, England, killing and terrorizing scores of people. Instead of the U.S. government gaining control over its own drones, a hacker is the one who finds the override code which can be used to control the drones.

1.3: System-Aware Secure Sentinel (SASS)In what appears to be pre-Chinese drone cyber-hijack programming, it was reported on December 6, 2014, that a US shield will protect drones from ‘spoofing’ cyber-attacks. According to the report, Pentagon-sponsored engineers have developed a system to shield unmanned aerial vehicles (UAVs) from cyber-attacks. Called “System-Aware Secure Sentinel” (SASS), the new system detects “illogical behavior” compared to how the aircraft normally operates and sounds the alert if a drone starts doing something that it is not supposed to do. “Detections can serve to initiate automated recovery actions and alert operators of the attack,” said Barry Horowitz, a systems and information engineer at the University of Virginia in Charlottesville, in a statement. Various threats were simulated by the researchers during five days of in-flight tests, including cyber-attacks launched from the ground, interference with supply chains and attacks from military insiders.

1.6: “Sting of the Drone”
The notion that the U.S. and China are on an irreversible collision course was recently highlighted during a CNN interview with Richard A. Clarke, the former counter-terrorism czar under George W. Bush. Clark stated in respect to the escalation of cyber-espionage between the United States and China that, “I actually hope it does result in escalation and tit-for-tat, because we need this issue resolved…We can’t go on the way it’s been…This first step by the United States will undoubtedly result in an escalation of this issue. And we need to do that. We need to have this issue resolved one way or the other. If the Chinese are going to keep hacking into our companies, then we’re going to have to do something about it”. Interestingly, Clark made his comments while promoting “Sting of the Drone” (2014), his latest book about the impending drone war with China. The interview, which was documented in the May 21, 2014, CNN report entitled “Why U.S./China Cyber Escalation Could Be Good”, is yet another example of how wars are created by the CIA long before they manifest themselves in reality.

3.4: Earthquake/Tsunami Planned Post Nuclear Attack
In the aftermath of a Las Vegas and/or California nuclear attack by China, a man-made earthquake will predictably take place in California. This particular notion was confirmed on April 26, 2015, when the Financial Times published a report entitled “California Prepares for the Next ‘Big One’”. A day prior on April 25, 2015, the LA Times published a report entitled “Researcher Says a Sinking Santa Catalina could Pose Tsunami Threat”, confirming, albeit in a de facto manner, that a tsunami is planned in the wake of a nuclear attack and earthquake.III. CHINESE CYBER-ATTACK:

3.2: U.S. Vulnerable to Cyber-Attack
In what appears to be a warning of a Chinese attack, Fox News published a report on November 25, 2014 entitled “Amid Hacking Attack, State Department Info-Security Still in Shambles. The timely report stated that the U.S. government “identified control deficiencies across a total of 102 different systems”. In other words, the entire U.S. government has been hacked, most likely be China. The report also stated that the info-tech weaknesses amount to a “significant deficiency” in its security, defined as a weakness that “significantly restricts the capability of the agency to carry out its mission or compromises the security of its information, information systems, personnel, or other resources, operations, or assets”. A day later on November 26, 2014, Fox New published a report entitled “US Lacks Strategy to Counter Unconventional Warfare Threats from States and Terrorists. The timely report by the Army Special Operations Command stated that China is waging unconventional warfare around the world, and the U.S. currently lacks a clear strategy to counter the threat. In other words, the U.S. is vulnerable to an unconventional Chinese attack, something a drone attack would qualify under. The report went on to state that “This challenge is hybrid warfare combining conventional, irregular, and asymmetric means, to include the persistent manipulation of political and ideological conflict”.

3.3: Regin Malware
The Chinese malware needed for a successful cyber-attack on the United States was recently identified by CNN in their November 23, 2014, report entitled “‘Regin’ Malware Described as ‘Groundbreaking and Almost Peerless’”. According to the timely report, “Reign” is malware that has been lurking in computers for as long as six years, according to Symantec (SYMC, Tech30), the cybersecurity firm that produces Norton Antivirus. “Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state,” Symantec explained and that “development took months, if not years, to complete.” Researchers stated little to answer several key questions such as: Who designed it? How widely has it spread? What has it scooped up? What are the risks? In other words, the entire internet infrastructure of the United States has been hijacked by the Regin malware and therefore any type of cyber-related attack or hijack of on America’s military is possible. In reality, the internet was built specifically so that a third party can access it and crash certain entities when politically expedient.

4.2: Chinese EMP Attack?
Back on November 10, 2010, it was reported that a satellite monitoring the western coast region of North America detected an “EMP anomalous event” when a Chinese sub allegedly fired an EMP weapon on November 8, 2010. According to the report, the Chinese Navy attacked the U.S. based cruise ship entitled the “Carnival Splendor” with an EMP missile, resulting in a “catastrophic crippling” that left 4,500 passengers stranded and its crew “dead in the water”. Later that day on November 8, 2010, a mysterious missile was caught on video flying off the coast of California near Los Angeles, California. Although the U.S. government denied that they were responsible for the missile, a Russian report later stated that the missile was in fact a BGM-109 (Tomahawk) subsonic cruise missile launched from a U.S. Navy Ohio-Class submarine operating off the coast of California. What exactly happened that day is not clear, but apparently the U.S. and/or the Chinese military attacked the “Carnival Splendor” with an EMP missile. Evidently, the U.S. Navy sent up a Tomahawk cruise missile as a decoy to distract people from this unprecedented EMP missile attack on an American cruise ship. Conversely, it is also possible that the mysterious missile caught flying off the coast of California was in fact the U.S. EMP missile responsible for the “catastrophic crippling” of the Carnival Splendor.

Truther.org Legal DisclaimerTruther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

Considering that there is virtually no interest in cricket within the United States which does not play the game in any real capacity, it appears the Cricket All-Stars Series 2015 was created at the behest of the CIA specifically so that a cricket-related attack could commence.

Exactly what type of terror is planned for the inaugural Cricket All-Stars Series 2015 is not known, but an Islamic terror attack is the most likely terror scenario. Said attack will predictably be linked to the country of Pakistan which previously executed a cricket-related attack.

That being said, the tests in question could suffer a full-scale terrorists invasion by the state-sponsored terror group known as ISIS. Consequently, beheadings, conventional bombings, mass shootings, mass stabbings, and/or suicide bomber attacks may be forthcoming.

The CIA-spawned report was evidently designed to sell the notion that the government of Pakistan is secretly harboring Islamic terrorists just prior to a horrific cricket-related terror attack which is subsequently blamed on the country of Pakistan.

Truther.org Legal DisclaimerTruther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

SWITZERLAND, Zurich — Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is plotting a major cyber-attack on Facebook this October or November that will predictably be blamed on Anonymous, China, North Korea or Russia.

Since hundreds of millions of people around the world use Facebook on a daily basis, the attack will in essence be a global cyber-terror attack, the first of its kind. While website Facebook is indeed the #1 target, real-world entities such as Facebook headquarters could also be attacked.

Five days later on September 21, 2015, it was reported that the Skype app was down across the globe. Post-state-sponsored cyber-attack, the Skype incident will predictably be chalked up to yet another cyber-attack by Anonymous, China, North Korea or Russia.

In order to draw unprecedented media publicity to Facebook just prior to a false-flag on its website and/or satellites, Fox News published a report on October 9, 2015, entitled “Why Facebook Bought a Satellite”. In the event that said satellite is hacked, China will most likely be blamed.

In order to set the precedent for an unprecedented cyber-attack on Facebook just prior to its fruition in reality, it was reported on November 10, 2015, that Netflix crashed, albeit briefly. Post Facebook-attack, the Nexflix crash will predictably be labeled a cyber-attack.

Lastly, it is imperative to note that Facebook is a covert intelligence operation which was created by the CIA in order to: a) develop psychological profiles, b) tracking users, and c) monitor communication. In other words, Facebook is a private espionage corporation like STRATFOR which is routinely used by the CIA, FBI, NSA, etc.

Facebook Headquarters Attack
Although a Facebook cyber-attack is the most likely terror scenario, there is also a possibility that Facebook Headquarters in Menlo Park, California could also suffer a state-sponsored terror attack. A future scenario in which Facebook is bombed, suffers a bio-terror attack, or is openly hacked by “domestic terrorists” who storm the campus is unfortunately a real possibility. This type of attack was foreshadowed back on March 11, 2014, when Facebook’s headquarters were locked down due to an alleged bomb threat. Whether the suspicious 1.5 hour closure provided the necessary cover for the installation of demolition explosives and/or weapons on Facebook’s campus is not known, but said explosives could be detonated via remote control at a future date in order to give the appearance of a coordinated terrorist attack. Interestingly, just 4 days prior to the aforementioned bomb threat, it was revealed that Facebook Headquarters had hired their own $200,000 a year police officer to “help [Facebook] conduct exercises for a bomb threat or for an active shooter incident”. The new police officer will reportedly be paid by a private security firm, making it all the more likely that he will be an accessory in a Facebook terror plot. In the event that Facebook Headquarters is successfully attacked, it will create a situation whereby every time the hundreds of millions of Facebook users log onto Facebook, they will be instantly reminded of the horrific attack (e.g., 9/11 and dialing 911 for an emergency). Therefore, an attack on Facebook is in essence a psychological attack more than anything which is why it is such a lucrative terror target.

Truther.org Legal DisclaimerTruther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste

Considering that there is virtually no interest in cricket within the United States which does not play the game in any real capacity, it appears the Cricket All-Stars Series 2015 was created at the behest of the CIA specifically so that a cricket-related attack could commence.

Exactly what type of terror is planned for the inaugural Cricket All-Stars Series 2015 is not known, but an Islamic terror attack is the most likely terror scenario. Said attack will predictably be linked to the country of Pakistan which previously executed a cricket-related attack.

That being said, the tests in question could suffer a full-scale terrorists invasion by the state-sponsored terror group known as ISIS. Consequently, beheadings, conventional bombings, mass shootings, mass stabbings, and/or suicide bomber attacks may be forthcoming.

The CIA-spawned report was evidently designed to sell the notion that the government of Pakistan is secretly harboring Islamic terrorists just prior to a horrific cricket-related terror attack which is subsequently blamed on the country of Pakistan.

Truther.org Legal DisclaimerTruther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste